Cloud computing provides the capability to use computing and storage resources on a metered basis and reduce the investments in an organization�s computing infrastructure. The spawning and deletion of virtual machines running on physical hardware and being controlled by hypervisors is a cost-efficient and flexible computing paradigm. In addition, the integration and widespread availability of large amounts of sanitized information such as health care records can be of tremendous benefit to researchers and practitioners. However, as with any technology, the full potential of the cloud cannot be achieved without understanding its capabilities, vulnerabilities, advantages, and trade-offs. We propose a new method of achieving the maximum benefit from cloud computation with minimal risk. Issues such as data ownership, privacy protections, data mobility, quality of service and service levels, bandwidth costs, data protection, and support have to be tackled in order to achieve the maximum benefit from cloud computation with minimal risk.
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutionsijccsa
The document summarizes security issues related to the software as a service (SaaS) model of cloud computing. It discusses traditional security challenges like authentication, authorization, availability and data confidentiality that also affect the SaaS model. It also describes new security issues introduced by the cloud computing paradigm, such as data being stored across multiple locations and servers owned by different providers. The document analyzes these security challenges and proposes some potential solutions discussed in other literature.
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...IJERA Editor
Cloud computing, undoubtedly, is a path to expand the limits or add powerful capabilities on-demand with
almost no investment in new framework, training new staff, or authorizing new software. Though today
everyone is talking about cloud but, organizations are still in dilemma whether it’s safe to deploy their business
on cloud. The reason behind it; is nothing but Security. No cloud service provider provides 100% security
assurance to its customers and therefore, businesses are hesitant to accept cloud and the vast benefits that come
along with it. The absence of proper security controls delimits the benefits of cloud. In this paper, a review on
different cloud service models and a survey of the different security challenges and issues while providing
services in cloud is presented .The paper focuses on the security issues specific to service delivery model (SaaS,
IaaS and PaaS) of cloud environment. This paper also explores the various security solutions currently being
applied to protect cloud from various kinds of intruders.
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhShah Sheikh
This document discusses cloud computing and security considerations for organizations adopting cloud services. It makes three key points:
1. Cloud computing provides on-demand delivery of computing resources but also poses new security risks and challenges for organizations related to loss of control of data and infrastructure. A holistic risk management approach is needed.
2. Key security considerations for organizations adopting cloud services include understanding compliance requirements, performing risk assessments of cloud assets, validating information lifecycles, ensuring data security, and establishing security agreements with cloud providers.
3. As organizations lose control of their data and infrastructure in the cloud, new strategies are needed to ensure data portability between cloud providers, availability of audit controls, and proper management of data
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
Deployment of using cloud services as a new approach to keep people's platforms, Infrastructure and applications has become an important issue in the world of communications technology. This is a very useful paradigm for humans to obtain their essential needs simpler, faster ,more flexible, and safer than before. But there are many concerns about this system challenge. Security is the most important challenge for cloud systems. In this paper we design and explain the procedure of implementation of a new method for cloud services based on multi clouds on our platform which supplies security and privacy more than other clouds. We introduce some confidentiality and security methods in each layer to have a secure access to requirements. The architecture of our method and the implementation of method on our selected platform for each layer are introduced in this paper.
Design and implement a new cloud security method based on multi clouds on ope...csandit
Deployment of using cloud services as a new approach to keep people's platforms,
Infrastructure and applications has become an important issue in the world of communications
technology. This is a very useful paradigm for humans to obtain their essential needs simpler,
faster ,more flexible, and safer than before. But there are many concerns about this system
challenge. Security is the most important challenge for cloud systems. In this paper we design
and explain the procedure of implementation of a new method for cloud services based on multi
clouds on our platform which supplies security and privacy more than other clouds. We
introduce some confidentiality and security methods in each layer to have a secure access to
requirements. The architecture of our method and the implementation of method on our selected
platform for each layer are introduced in this paper.
Security in Clouds: Cloud security challenges – Software as a
Service Security, Common Standards: The Open Cloud Consortium – The Distributed management Task Force – Standards for application Developers – Standards for Messaging – Standards for Security, End user access to cloud computing, Mobile Internet devices and the cloud. Hadoop – MapReduce – Virtual Box — Google App Engine – Programming Environment for Google App Engine.
Requirements and Challenges for Securing Cloud Applications and ServicesIOSR Journals
This document discusses the requirements and challenges for securing cloud applications and services. It begins with an abstract that introduces cloud computing security as complex due to many factors. The document then provides context on cloud computing architectural frameworks and models to help evaluate security risks when adopting cloud services. It discusses key aspects of cloud architecture like deployment models, service models, and multi-tenancy that impact security. Understanding these relationships is important for informed risk management decisions regarding cloud adoption strategies.
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutionsijccsa
The document summarizes security issues related to the software as a service (SaaS) model of cloud computing. It discusses traditional security challenges like authentication, authorization, availability and data confidentiality that also affect the SaaS model. It also describes new security issues introduced by the cloud computing paradigm, such as data being stored across multiple locations and servers owned by different providers. The document analyzes these security challenges and proposes some potential solutions discussed in other literature.
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...IJERA Editor
Cloud computing, undoubtedly, is a path to expand the limits or add powerful capabilities on-demand with
almost no investment in new framework, training new staff, or authorizing new software. Though today
everyone is talking about cloud but, organizations are still in dilemma whether it’s safe to deploy their business
on cloud. The reason behind it; is nothing but Security. No cloud service provider provides 100% security
assurance to its customers and therefore, businesses are hesitant to accept cloud and the vast benefits that come
along with it. The absence of proper security controls delimits the benefits of cloud. In this paper, a review on
different cloud service models and a survey of the different security challenges and issues while providing
services in cloud is presented .The paper focuses on the security issues specific to service delivery model (SaaS,
IaaS and PaaS) of cloud environment. This paper also explores the various security solutions currently being
applied to protect cloud from various kinds of intruders.
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhShah Sheikh
This document discusses cloud computing and security considerations for organizations adopting cloud services. It makes three key points:
1. Cloud computing provides on-demand delivery of computing resources but also poses new security risks and challenges for organizations related to loss of control of data and infrastructure. A holistic risk management approach is needed.
2. Key security considerations for organizations adopting cloud services include understanding compliance requirements, performing risk assessments of cloud assets, validating information lifecycles, ensuring data security, and establishing security agreements with cloud providers.
3. As organizations lose control of their data and infrastructure in the cloud, new strategies are needed to ensure data portability between cloud providers, availability of audit controls, and proper management of data
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
Deployment of using cloud services as a new approach to keep people's platforms, Infrastructure and applications has become an important issue in the world of communications technology. This is a very useful paradigm for humans to obtain their essential needs simpler, faster ,more flexible, and safer than before. But there are many concerns about this system challenge. Security is the most important challenge for cloud systems. In this paper we design and explain the procedure of implementation of a new method for cloud services based on multi clouds on our platform which supplies security and privacy more than other clouds. We introduce some confidentiality and security methods in each layer to have a secure access to requirements. The architecture of our method and the implementation of method on our selected platform for each layer are introduced in this paper.
Design and implement a new cloud security method based on multi clouds on ope...csandit
Deployment of using cloud services as a new approach to keep people's platforms,
Infrastructure and applications has become an important issue in the world of communications
technology. This is a very useful paradigm for humans to obtain their essential needs simpler,
faster ,more flexible, and safer than before. But there are many concerns about this system
challenge. Security is the most important challenge for cloud systems. In this paper we design
and explain the procedure of implementation of a new method for cloud services based on multi
clouds on our platform which supplies security and privacy more than other clouds. We
introduce some confidentiality and security methods in each layer to have a secure access to
requirements. The architecture of our method and the implementation of method on our selected
platform for each layer are introduced in this paper.
Security in Clouds: Cloud security challenges – Software as a
Service Security, Common Standards: The Open Cloud Consortium – The Distributed management Task Force – Standards for application Developers – Standards for Messaging – Standards for Security, End user access to cloud computing, Mobile Internet devices and the cloud. Hadoop – MapReduce – Virtual Box — Google App Engine – Programming Environment for Google App Engine.
Requirements and Challenges for Securing Cloud Applications and ServicesIOSR Journals
This document discusses the requirements and challenges for securing cloud applications and services. It begins with an abstract that introduces cloud computing security as complex due to many factors. The document then provides context on cloud computing architectural frameworks and models to help evaluate security risks when adopting cloud services. It discusses key aspects of cloud architecture like deployment models, service models, and multi-tenancy that impact security. Understanding these relationships is important for informed risk management decisions regarding cloud adoption strategies.
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
This document discusses security issues related to software-as-a-service (SaaS) applications in cloud computing environments. It first highlights different environments where SaaS is used and then analyzes common SaaS security challenges like data, application, and deployment security. The document then discusses digital forensics investigations of crimes related to cloud environments. It proposes a cloud forensics strategy to help investigators examine cybercrimes in an effective and efficient manner. Finally, the document identifies different types of security attacks on cloud computing and SaaS components, along with associated vulnerabilities and potential countermeasures.
A proficient 5 c approach to boost the security in the saas model's technical...ijccsa
For anything that involves delivering hosted services over the internet is cloud computing.These services
are classified as: IaaS,SaaS,PaaS.This paper focuses on SaaS security measures. SaaS is a cloud based
productivity suite that helps the business people to connect and work from anywhere on any device. The
data solely dumped behind a corporate firewall and it is physically accessed by the people through VPN
system or through online.The only hurdle while adopting cloud computing is the lack of security.It is a
major issue in the cloud for data as well as application and the platform. This paper gives an efficient
approach named 5C approach for applying security under SaaSmodel.Itmainly focuses on authentication
and authorization for customer data under SaaS in the cloud. The 5C mainly uses initial user level security
in the architecture of SaaS server by integrating the Visual Guard Web Admin Console with other controls.
Guddu Kumar. “A Review on Data Protection of Cloud Computing Security, Benefits, Risks and Suggestions” United International Journal for Research & Technology (UIJRT) 1.2 (2019): 26-34.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
A Comparative Review on Data Security Challenges in Cloud ComputingIRJET Journal
This document discusses security challenges in cloud computing. It begins by providing background on cloud computing models including software as a service (SaaS), platform as a service (PaaS), infrastructure as a service (IaaS), and deployment models. It then discusses various security challenges including those related to deployment models, service models, and networks. Specific issues mentioned include data breaches, data loss, insecure APIs, authentication and identity management. The document also reviews related work on cloud security and provides a comparative analysis of encryption algorithms used for cloud security such as DES, Triple DES, AES, and Blowfish.
This white paper discusses five considerations for securing hybrid clouds: 1) gaining constant visibility through continuous monitoring, 2) employing a workload-centric security model, 3) leveraging automation for operational efficiency, 4) applying the right control to the right assets, and 5) employing an integrated security solution for breadth and depth. Hybrid clouds are becoming more common as they allow organizations to take advantage of both internal and external cloud-based infrastructure. However, their dynamic nature presents new security challenges that require solutions designed specifically for hybrid cloud environments.
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
This document discusses multitenancy in cloud computing. It begins with an abstract describing multitenancy as the sharing of computing infrastructure like databases, processors and storage among multiple customers and organizations, providing cost and performance advantages. It then provides background on cloud computing and its advantages over traditional server systems. The document outlines the various components of a multitenant cloud computing system including users, providers and modules. It discusses requirements analysis and describes the system architecture and a multi-cloud system approach. In conclusion, it states that cloud computing will be extremely useful in the future for both testing startup projects and moving existing technology to reduce costs through a pay-per-use model.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
The paradigm called “Cloud computing” acts as a mechanism for attaining the resources of shared technology and infrastructure cost-effectively. The on-demand services are accomplished to execute the various operations across the network. Regularly, the last client doesn't know about the area of open physical assets and devices. Developing, using, and dealing with their applications 'on the cloud', which includes virtualization of assets that keeps and guides itself are led by arranged activities to clients. Calculation experience the new methodology of cloud computing which perhaps keeps the world and can set up all the human necessities. At the end of the day, cloud computing is the ensuing normal step in the development of on-request data innovation administrations and items. The Cloud is an allegory for the Internet and is an idea for the secured confused foundation; it likewise relies upon drawing network graphs on a computer. In this work, thorough investigations of distributed computing security and protection concerns are given. The work distinguishes both the identified and unidentified attacks, vulnerabilities in the cloud, security attacks and also the solutions to control these threats and attacks. Moreover, the restrictions of the present solutions and offers various perceptions of security viewpoints are distinguished and explored. At long last, a cloud security system is given in which the different lines of protection and the reliance levels among them are identified.
Security of Data in Cloud Environment Using DPaaSIJMER
The rapid development of cloud computing is giving way to more cloud services, due to
which security of services of cloud especially data confidentiality protection, becomes more critical.
Cloud computing is an emerging computing style which provides dynamic services, scalable and payper-use.
Although cloud computing provides numerous advantages, a key challenge is how to ensure
and build confidence that the cloud can handle user data securely. This paper highlights some major
security issues that exist in current cloud computing environments. The status of the development of
cloud computing security, the data privacy analysis, security audit, information check and another
challenges that the cloud computing security faces have been explored. The recent researches on data
protection regarding security and privacy issues in cloud computing have partially addressed some
issues. The best option is to build data-protection solutions at the platform layer. The growing appeal
of data protection as a service is that it enables to access just the resources you need at minimal
upfront expense while providing the benefits of enterprise-class data protection capabilities. The
paper proposes a solution to make existing developed applications for simple cloud Systems
compatible with DPaaS. The various security challenges have been highlighted and the various
necessary metrics required for designing DPaaS have been investigated.
This document discusses security and privacy issues related to cloud computing. It begins by defining cloud computing and describing the four broad categories of cloud services: IaaS, PaaS, DSaaS, and SaaS. It then discusses general security issues faced by both cloud service providers and consumers. Specific issues are organized by governance domain, operational domain, and computer network domain for providers, and by governance, architecture, identity and access management, and availability for consumers. The document also summarizes security challenges related to each type of cloud service and issues regarding virtualization and legal concerns in cloud computing.
This document provides an overview of secure cloud hosting best practices for enterprise messaging solutions. It discusses the benefits and risks of cloud computing, as well as common deployment and service models. The document then focuses on Infinite Convergence's Enterprise Messaging Service (EMS), which is hosted privately and securely at Infinite's premises. Some key security practices for EMS include robust identity and access management, comprehensive monitoring and metering, adherence to service level agreements, and lifecycle management of applications and data. Virtualization is also discussed as the core technology enabling efficient cloud hosting.
Cloud Computing: Business Trends and the Challengesidescitation
The purpose of this paper is to provide information
to businesses interested in cloud computing. First we define
cloud computing and discuss the different service and
deployment models from a business standpoint. Then we move
into business cases for the cloud and the strengths of each
service and deployment model. We follow this up with business
attributes that tend to drive a cloud adaption and the effects of
cloud on business IT. The last section reveals the challenges
of cloud computing ranging from security concerns and legal
issues, to negotiation of an adequate service level agreement.
A traditional computing environment requires a costly
infrastructure to offer a better service to users. The introduction
of cloud computing has changed the working environment from
traditional to virtual. A larger number of IT companies are
utilizing the cloud. On the one hand, the cloud attracts more
number of consumers by offering services with minimized
capital cost and virtual infrastructure. On the other hand, there
are a risk and security challenges in cloud computing that
makes the user not to move completely towards it. The cloud
environment is more vulnerable to security breaches and data
theft. Moreover, insider attacks are more frequent in larger
enterprises. An unauthenticated user can cause more damage
to company reputation. The cloud service providers are trying
to provide a secure work environment for users. However,
there is a lack of global standards and policies to invoke
security measures in cloud computing. This study aims to
highlight and classify security challenges and trust issues in the
cloud environment.
The survey was conducted in various institutions and
governmental organizations in Saudi Arabia to study the
opinions of stakeholders on cloud computing security
challenges and risks.
Links:
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
The document proposes a new cloud computing paradigm called data protection as a service (DPaaS) to address user concerns about data security and privacy in the cloud. DPaaS is a suite of security primitives offered by a cloud platform to enforce data security, privacy, and provide evidence of privacy for data owners even if applications are compromised. This reduces per-application effort to provide data protection while allowing for rapid development. The architecture achieves economies of scale by amortizing expertise costs across applications. DPaaS uses techniques like encryption, logging, and key management to securely store data in the cloud.
Cloud computing a services business application challengesEditor Jacotech
This document discusses challenges related to adopting Software as a Service (SaaS) business applications. It reviews literature that has identified key challenges such as data security, customization, and scalability. The document provides background on cloud computing models including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). It also discusses characteristics of the SaaS cloud computing model and the business value it provides.
For IT recruiters, and just about everyone who has been interested in tech, cloud is not a new phenomena. However, over the past 18 months, adoption of cloud is growing quickly and is now used in some shape or form by businesses of all sizes around the world.
This issue provides an overview to the rise of cloud, highlights the most in demand IT skills and lists the fastest growing cloud companies by employee.
In this QuickView
- Fastest growing cloud companies by employees
- Most in demand skills, job roles and certifications
- Top employers of cloud professionals
- Is Big-data-as-a-service the next big growth sector?
- Top 5 uses of cloud computing for 2015
This document provides an overview of ANEKA, a cloud application platform developed by Manjrasoft Pvt. Ltd. that allows for building and managing distributed applications and multiple clouds. It discusses cloud computing concepts and the need for multiple clouds and resource management. ANEKA addresses issues with existing approaches by providing programming models, tools, and APIs to deploy scalable applications across distributed networks and clouds. The document outlines ANEKA's architecture, functions for building, deploying, and managing applications, and compares its programming models including Task, Thread, MapReduce, and Parameter Sweeping. In summary, ANEKA is a platform that enables development of applications for multiple cloud environments and distributed networks through its programming abstractions and
Migrating to Cloud? 5 motivations and 10 key security architecture considerat...Yew Weisin
1) The document discusses key considerations for developing a secure cloud migration strategy, including strategic alignment, security management and governance, access management, data classification and management, encryption, monitoring and reporting, and identity and access management.
2) It identifies 10 key security architecture considerations for cloud migration: division of responsibility, multi-tenancy, data classification and management, encryption and key management, monitoring and reporting, access management, business continuity, risk assessment, change management, and security as a service.
3) The document emphasizes that access management is one of the most critical security areas for cloud, and identity and access management as a service and cloud access security brokers are growing trends to help govern cloud services.
A Survey of Ontology-based Information Extraction for Social Media Content An...ijcnes
The amount of information generated in the Web has grown enormously over the years. This information is significant to individuals, businesses and organizations. If analyzed, understood and utilized, it will provide a valuable insight to its stakeholders. However, many of these information are semi-structured or unstructured which makes it difficult to draw in-depth understanding of the implications behind those information. This is where Ontology-based Information Extraction (OBIE) and social media content analysis come into play. OBIE has now become a popular way to extract information coming from machine-readable sources. This paper presents a survey of OBIE, Ontology languages and tools and the process to build an ontology model and framework. The author made a comparison of two ontology building frameworks and identified which framework is complete.
Economic Growth of Information Technology (It) Industry on the Indian Economyijcnes
Information Technology (IT) is an important emerging sector of the Indian Economy. IT in India is an industry comprising of two noteworthy segments IT administrations and business process outsourcing (BPO).The segment has expanded its commitment to Indias GDP from 1.2% in 1998 to 9.3% in 2015. According to NASSCOM, the segment amassed incomes of US$147 billion out of 2015, with send out income remaining at US$99 billion and household income at US$48 billion, developing by more than 13%.Indias present Prime Minister Narendra Modi has begun a venture called �DIGITAL INDIA i.e., Computerized India to help secure IT a position both inside and outside of India. The IT sector has served as a fertile ground for the growth of a new entrepreneurial class with innovative corporate practices and has been instrumental in reversing the brain drain, raising Indias brand equity and attracting foreign direct investment (FDI) leading to other associated benefits. The Size of this sector has increased at a tremendous rate of 35% per year during the last 10 years. This Paper examines the India�s growth in IT industry and also studied the impact of IT on the Indian Economy.
More Related Content
Similar to Investigation on Challenges in Cloud Security to Provide Effective Cloud Computing Paradigm
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
This document discusses security issues related to software-as-a-service (SaaS) applications in cloud computing environments. It first highlights different environments where SaaS is used and then analyzes common SaaS security challenges like data, application, and deployment security. The document then discusses digital forensics investigations of crimes related to cloud environments. It proposes a cloud forensics strategy to help investigators examine cybercrimes in an effective and efficient manner. Finally, the document identifies different types of security attacks on cloud computing and SaaS components, along with associated vulnerabilities and potential countermeasures.
A proficient 5 c approach to boost the security in the saas model's technical...ijccsa
For anything that involves delivering hosted services over the internet is cloud computing.These services
are classified as: IaaS,SaaS,PaaS.This paper focuses on SaaS security measures. SaaS is a cloud based
productivity suite that helps the business people to connect and work from anywhere on any device. The
data solely dumped behind a corporate firewall and it is physically accessed by the people through VPN
system or through online.The only hurdle while adopting cloud computing is the lack of security.It is a
major issue in the cloud for data as well as application and the platform. This paper gives an efficient
approach named 5C approach for applying security under SaaSmodel.Itmainly focuses on authentication
and authorization for customer data under SaaS in the cloud. The 5C mainly uses initial user level security
in the architecture of SaaS server by integrating the Visual Guard Web Admin Console with other controls.
Guddu Kumar. “A Review on Data Protection of Cloud Computing Security, Benefits, Risks and Suggestions” United International Journal for Research & Technology (UIJRT) 1.2 (2019): 26-34.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
A Comparative Review on Data Security Challenges in Cloud ComputingIRJET Journal
This document discusses security challenges in cloud computing. It begins by providing background on cloud computing models including software as a service (SaaS), platform as a service (PaaS), infrastructure as a service (IaaS), and deployment models. It then discusses various security challenges including those related to deployment models, service models, and networks. Specific issues mentioned include data breaches, data loss, insecure APIs, authentication and identity management. The document also reviews related work on cloud security and provides a comparative analysis of encryption algorithms used for cloud security such as DES, Triple DES, AES, and Blowfish.
This white paper discusses five considerations for securing hybrid clouds: 1) gaining constant visibility through continuous monitoring, 2) employing a workload-centric security model, 3) leveraging automation for operational efficiency, 4) applying the right control to the right assets, and 5) employing an integrated security solution for breadth and depth. Hybrid clouds are becoming more common as they allow organizations to take advantage of both internal and external cloud-based infrastructure. However, their dynamic nature presents new security challenges that require solutions designed specifically for hybrid cloud environments.
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
This document discusses multitenancy in cloud computing. It begins with an abstract describing multitenancy as the sharing of computing infrastructure like databases, processors and storage among multiple customers and organizations, providing cost and performance advantages. It then provides background on cloud computing and its advantages over traditional server systems. The document outlines the various components of a multitenant cloud computing system including users, providers and modules. It discusses requirements analysis and describes the system architecture and a multi-cloud system approach. In conclusion, it states that cloud computing will be extremely useful in the future for both testing startup projects and moving existing technology to reduce costs through a pay-per-use model.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
The paradigm called “Cloud computing” acts as a mechanism for attaining the resources of shared technology and infrastructure cost-effectively. The on-demand services are accomplished to execute the various operations across the network. Regularly, the last client doesn't know about the area of open physical assets and devices. Developing, using, and dealing with their applications 'on the cloud', which includes virtualization of assets that keeps and guides itself are led by arranged activities to clients. Calculation experience the new methodology of cloud computing which perhaps keeps the world and can set up all the human necessities. At the end of the day, cloud computing is the ensuing normal step in the development of on-request data innovation administrations and items. The Cloud is an allegory for the Internet and is an idea for the secured confused foundation; it likewise relies upon drawing network graphs on a computer. In this work, thorough investigations of distributed computing security and protection concerns are given. The work distinguishes both the identified and unidentified attacks, vulnerabilities in the cloud, security attacks and also the solutions to control these threats and attacks. Moreover, the restrictions of the present solutions and offers various perceptions of security viewpoints are distinguished and explored. At long last, a cloud security system is given in which the different lines of protection and the reliance levels among them are identified.
Security of Data in Cloud Environment Using DPaaSIJMER
The rapid development of cloud computing is giving way to more cloud services, due to
which security of services of cloud especially data confidentiality protection, becomes more critical.
Cloud computing is an emerging computing style which provides dynamic services, scalable and payper-use.
Although cloud computing provides numerous advantages, a key challenge is how to ensure
and build confidence that the cloud can handle user data securely. This paper highlights some major
security issues that exist in current cloud computing environments. The status of the development of
cloud computing security, the data privacy analysis, security audit, information check and another
challenges that the cloud computing security faces have been explored. The recent researches on data
protection regarding security and privacy issues in cloud computing have partially addressed some
issues. The best option is to build data-protection solutions at the platform layer. The growing appeal
of data protection as a service is that it enables to access just the resources you need at minimal
upfront expense while providing the benefits of enterprise-class data protection capabilities. The
paper proposes a solution to make existing developed applications for simple cloud Systems
compatible with DPaaS. The various security challenges have been highlighted and the various
necessary metrics required for designing DPaaS have been investigated.
This document discusses security and privacy issues related to cloud computing. It begins by defining cloud computing and describing the four broad categories of cloud services: IaaS, PaaS, DSaaS, and SaaS. It then discusses general security issues faced by both cloud service providers and consumers. Specific issues are organized by governance domain, operational domain, and computer network domain for providers, and by governance, architecture, identity and access management, and availability for consumers. The document also summarizes security challenges related to each type of cloud service and issues regarding virtualization and legal concerns in cloud computing.
This document provides an overview of secure cloud hosting best practices for enterprise messaging solutions. It discusses the benefits and risks of cloud computing, as well as common deployment and service models. The document then focuses on Infinite Convergence's Enterprise Messaging Service (EMS), which is hosted privately and securely at Infinite's premises. Some key security practices for EMS include robust identity and access management, comprehensive monitoring and metering, adherence to service level agreements, and lifecycle management of applications and data. Virtualization is also discussed as the core technology enabling efficient cloud hosting.
Cloud Computing: Business Trends and the Challengesidescitation
The purpose of this paper is to provide information
to businesses interested in cloud computing. First we define
cloud computing and discuss the different service and
deployment models from a business standpoint. Then we move
into business cases for the cloud and the strengths of each
service and deployment model. We follow this up with business
attributes that tend to drive a cloud adaption and the effects of
cloud on business IT. The last section reveals the challenges
of cloud computing ranging from security concerns and legal
issues, to negotiation of an adequate service level agreement.
A traditional computing environment requires a costly
infrastructure to offer a better service to users. The introduction
of cloud computing has changed the working environment from
traditional to virtual. A larger number of IT companies are
utilizing the cloud. On the one hand, the cloud attracts more
number of consumers by offering services with minimized
capital cost and virtual infrastructure. On the other hand, there
are a risk and security challenges in cloud computing that
makes the user not to move completely towards it. The cloud
environment is more vulnerable to security breaches and data
theft. Moreover, insider attacks are more frequent in larger
enterprises. An unauthenticated user can cause more damage
to company reputation. The cloud service providers are trying
to provide a secure work environment for users. However,
there is a lack of global standards and policies to invoke
security measures in cloud computing. This study aims to
highlight and classify security challenges and trust issues in the
cloud environment.
The survey was conducted in various institutions and
governmental organizations in Saudi Arabia to study the
opinions of stakeholders on cloud computing security
challenges and risks.
Links:
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
The document proposes a new cloud computing paradigm called data protection as a service (DPaaS) to address user concerns about data security and privacy in the cloud. DPaaS is a suite of security primitives offered by a cloud platform to enforce data security, privacy, and provide evidence of privacy for data owners even if applications are compromised. This reduces per-application effort to provide data protection while allowing for rapid development. The architecture achieves economies of scale by amortizing expertise costs across applications. DPaaS uses techniques like encryption, logging, and key management to securely store data in the cloud.
Cloud computing a services business application challengesEditor Jacotech
This document discusses challenges related to adopting Software as a Service (SaaS) business applications. It reviews literature that has identified key challenges such as data security, customization, and scalability. The document provides background on cloud computing models including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). It also discusses characteristics of the SaaS cloud computing model and the business value it provides.
For IT recruiters, and just about everyone who has been interested in tech, cloud is not a new phenomena. However, over the past 18 months, adoption of cloud is growing quickly and is now used in some shape or form by businesses of all sizes around the world.
This issue provides an overview to the rise of cloud, highlights the most in demand IT skills and lists the fastest growing cloud companies by employee.
In this QuickView
- Fastest growing cloud companies by employees
- Most in demand skills, job roles and certifications
- Top employers of cloud professionals
- Is Big-data-as-a-service the next big growth sector?
- Top 5 uses of cloud computing for 2015
This document provides an overview of ANEKA, a cloud application platform developed by Manjrasoft Pvt. Ltd. that allows for building and managing distributed applications and multiple clouds. It discusses cloud computing concepts and the need for multiple clouds and resource management. ANEKA addresses issues with existing approaches by providing programming models, tools, and APIs to deploy scalable applications across distributed networks and clouds. The document outlines ANEKA's architecture, functions for building, deploying, and managing applications, and compares its programming models including Task, Thread, MapReduce, and Parameter Sweeping. In summary, ANEKA is a platform that enables development of applications for multiple cloud environments and distributed networks through its programming abstractions and
Migrating to Cloud? 5 motivations and 10 key security architecture considerat...Yew Weisin
1) The document discusses key considerations for developing a secure cloud migration strategy, including strategic alignment, security management and governance, access management, data classification and management, encryption, monitoring and reporting, and identity and access management.
2) It identifies 10 key security architecture considerations for cloud migration: division of responsibility, multi-tenancy, data classification and management, encryption and key management, monitoring and reporting, access management, business continuity, risk assessment, change management, and security as a service.
3) The document emphasizes that access management is one of the most critical security areas for cloud, and identity and access management as a service and cloud access security brokers are growing trends to help govern cloud services.
Similar to Investigation on Challenges in Cloud Security to Provide Effective Cloud Computing Paradigm (20)
A Survey of Ontology-based Information Extraction for Social Media Content An...ijcnes
The amount of information generated in the Web has grown enormously over the years. This information is significant to individuals, businesses and organizations. If analyzed, understood and utilized, it will provide a valuable insight to its stakeholders. However, many of these information are semi-structured or unstructured which makes it difficult to draw in-depth understanding of the implications behind those information. This is where Ontology-based Information Extraction (OBIE) and social media content analysis come into play. OBIE has now become a popular way to extract information coming from machine-readable sources. This paper presents a survey of OBIE, Ontology languages and tools and the process to build an ontology model and framework. The author made a comparison of two ontology building frameworks and identified which framework is complete.
Economic Growth of Information Technology (It) Industry on the Indian Economyijcnes
Information Technology (IT) is an important emerging sector of the Indian Economy. IT in India is an industry comprising of two noteworthy segments IT administrations and business process outsourcing (BPO).The segment has expanded its commitment to Indias GDP from 1.2% in 1998 to 9.3% in 2015. According to NASSCOM, the segment amassed incomes of US$147 billion out of 2015, with send out income remaining at US$99 billion and household income at US$48 billion, developing by more than 13%.Indias present Prime Minister Narendra Modi has begun a venture called �DIGITAL INDIA i.e., Computerized India to help secure IT a position both inside and outside of India. The IT sector has served as a fertile ground for the growth of a new entrepreneurial class with innovative corporate practices and has been instrumental in reversing the brain drain, raising Indias brand equity and attracting foreign direct investment (FDI) leading to other associated benefits. The Size of this sector has increased at a tremendous rate of 35% per year during the last 10 years. This Paper examines the India�s growth in IT industry and also studied the impact of IT on the Indian Economy.
An analysis of Mobile Learning Implementation in Shinas College of Technology...ijcnes
In the past decade, technology has grown exponentially, especially the speed of the Internet and mobile technology have reached its peak it seems. This technology advancement also gives its impact to all the areas especially in the education sector. Researchers have to be interested in investigating how these technologies can be exploited for educational purposes aiming to enhance learning experiences. Subsequently, this has prompt an exploration slant which is ordinarily alluded to as Mobile Learning (M-Learning) in which specialists endeavors have meant to disseminate fitting learning encounters to learners considering their own flexibility needs, the universal usage of portable advances and the accessibility of data whenever � anyplace. By and by, m-learning is still in its start and extraordinary endeavors should be done as such as to explore the potential outcomes of educational outlook change from the conventional on-estimate fits-all illuminating ways to deal with a versatile and customized discovering that can be circulated by means of portable creations. This paper, presents the suitability and need of mobile learning facility in Shinas College of Technology(SHCT) and also presents the framework for implementing m-learning in SHCT.
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...ijcnes
The Advent of the digital age has led to a rise in different types of data with every passing day. In fact, it is expected that half of the total data used around the world will be on the cloud nowadays. This complex data needs to be stored, processed and analyzed for information gaining that can be used for several organizations. Cloud computing provides an appropriate platform for Software Defined Networking (SDN) in communicating and computing requirements of the latter. It makes cloud-based networking a viable research field in the current scenario. However, several issues addressed and risk needs to be mitigated in the L2 cloud server. Virtual networks and cloud federation being considered in the network virtualization over L3 cloud router. This research work explores the existing research challenges and discusses open issues for the security in cloud computing and its uses in the relevant field by means of a comparative analysis of L2 server L3 router based on SDN tools. Also, an analysis of such issues are discussed and summarized. Finally, the best tool identified for the use cloud security.
We briefly discuss about the e-government which is about the finishing transactions between the government and the public through internet. First, we wrote about the three sectors of e-government which are between government and (government, citizens, business). Second, we wrote about benefits that users can get from using e-government. Third, we wrote about the challenges that e-government fac
Power Management in Micro grid Using Hybrid Energy Storage Systemijcnes
This paper proposed for power management in micro grid using a hybrid distributed generator based on photovoltaic, wind-driven PMDC and energy storage system is proposed. In this generator, the sources are together connected to the grid with the help of interleaved boost converter followed by an inverter. Thus, compared to earlier schemes, the proposed scheme has fewer power converters. FUZZY based MPPT controllers are also proposed for the new hybrid scheme to separately trigger the interleaved DC-DC converter and the inverter for tracking the maximum power from both the sources. The integrated operations of both the proposed controllers for different conditions are demonstrated through simulation with the help of MATLAB software
Holistic Forecasting of Onset of Diabetes through Data Mining Techniquesijcnes
This document discusses using data mining techniques to holistically forecast the onset of diabetes. It proposes augmenting an existing diabetes dataset with additional attributes related to common diabetes symptoms. The augmented dataset is analyzed using association rule mining algorithms like Apriori and FP-Growth to generate rules for predicting diabetes status. Several high confidence rules are presented that integrate multiple attributes to determine whether a patient is likely to be diabetic or not diabetic based on their symptoms. The study suggests this holistic approach using an expanded dataset could more accurately predict diabetes onset compared to prior studies using only conventional datasets.
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...ijcnes
The aim of this survey is to list the various disease predictions from retinal funds images and various methods used to detect the disease. This paper gives a detailed description about the various diseases predicted in retina by comparing retinal funds image structure. Till now, the prediction of various diseases such as diabetic retinopathy, cardiovascular disease and other eye problems had been predicted by using retinal funds images. Next, a comparative study of the various methods followed using image processing to find out the diseases from retinal funds images, is provided. The basic matrices observed to predict the diseases are optic disc,nerve cup and rim. To find the differences in the basic matrices, image processing techniques such as mask generation, colour normalization, edge detection, contrast enhancement are used. The datasets that are used for retinal image inputs are STARE, DRIVE, ONHSD, ARIA, IMAGERET. The survey at the end, discusses the future work for the possibilities of predicting gastreointestinal problems via retinal funds images.
Feature Extraction in Content based Image Retrievalijcnes
This document discusses feature extraction methods for content-based image retrieval (CBIR). It describes Order Dither Block Truncation Coding (ODBTC), an image compression technique that can be used to extract image features without decoding. The proposed CBIR system extracts two features from ODBTC-encoded images: Color Co-occurrence Feature (CCF) and Bit Pattern Feature (BPF). CCF is extracted from color quantizers produced by ODBTC, while BPF is based on a bit pattern codebook generated from ODBTC bitmap images. Experimental results show this approach provides superior retrieval accuracy compared to earlier CBIR methods.
Challenges and Mechanisms for Securing Data in Mobile Cloud Computingijcnes
Cloud computing enables users to utilize the services of computing resources. Now days computing resources in mobile applications are being delivered with cloud computing. As there is a growing need for new mobile applications, usage of cloud computing can not be overlooked. Cloud service providers offers the services for the data request in a remote server. Virtualization aspect of cloud computing in mobile applications felicitates better utilization of resources. The industry needs to address the foremost security risk in the underlying technology. The cloud computing environment in mobile applications aggravated with various security problems. This paper addresses challenges in securing data in cloud for mobile Cloud computing and few mechanisms to overcome.
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...ijcnes
Mobile ad-hoc networks(MANETs) assume that mobile nodes voluntary cooperate in order to work properly. This cooperation is a cost-intensive activity and some nodes can refuse to cooperate, leading to a selfish node behaviour. Thus, the overall network performance could be seriously affected. The use of watchdogs is a well-known mechanism to detect selfish nodes. However, the detection process performed by watchdogs can fail, generating false positives and false negatives that can induce to wrong operations. Moreover, relying on local watchdogs alone can lead to poor performance when detecting selfish nodes, in term of precision and speed. This is especially important on networks with sporadic contacts, such as delay tolerant networks (DTNs), where sometimes watchdogs lack of enough time or information to detect the selfish nodes. Thus, We apply chord algorithm to identify behavior pattern of one shelf by two neighborhood nodes and themselves. Servers will finally categories nature of node.
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...ijcnes
Efficient utilization of radio resources in wireless networks is crucial and has been investigated extensively. This letter considers a wireless relay network where multiple user pairs conduct bidirectional communications via multiple relays based on orthogonal frequency-division multiplexing (OFDM) transmission. The joint optimization of channel and relay assignment, including subcarrier pairing, subcarrier allocation as well as relay selection, for total throughput maximization is formulated as a combinatorial optimization problem. Using a graph theoretical approach, we solve the problem optimally in polynomial time by transforming it into a maximum weighted bipartite matching (MWBM) problem. Simulation studies are carried out to evaluate the network total throughput versus transmit power per node and the number of relay nodes
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networksijcnes
Appropriate routing protocol in data transfer is a challenging problem of network in terms of lower end-to-end delay in delivery of data packets with improving packet delivery ratio and lower overhead as well. In this paper we explain an effective and scalable AODV (called as AODV-ES) for Wireless Ad hoc Sensor Networks (WASN) by using third party reply model, n-hop local ring and time-to-live based local recovery. Our goal is to reduce time delay for delivery of the data packets, routing overhead and improve the data packet delivery ratio. The resulting algorithm AODV-ES is then simulated by NS-2 under Linux operating system. The performance of routing protocol is evaluated under various mobility rates and found that the proposed routing protocol is better than AODV.
Secured Seamless Wi-Fi Enhancement in Dynamic Vehiclesijcnes
At present, cellular networks provide ubiquitous Internet connection, but with relatively expensive cost. Furthermore, the cellular networks have been proven to be insufficient for the surging amount of data from Internet enabled mobile devices. Due to the explosive growth of the subscriber number and the mobile data, cellular networks are suffering overload, and the users are experiencing service quality degradation. In this project implement seamless and efficient Wi-Fi based Internet access from moving vehicles. In our proposed implementation, a group of APs are employed to communicate with a client (called AP diversity), and the transmission succeeds if any AP in the group accomplishes the delivery with the client (called opportunistic transmission). Such AP diversity and opportunistic transmission are exploited to overcome the high packet loss rate, which is achieved by configuring all the APs with the same MAC and IP addresses. With such a configuration, a client gets a graceful illusion that only one (virtual) AP exists, and will always be associated with this virtual AP. Uplink communications, when the client transmits a packet to the virtual AP, actually multiple APs within its transmission range are able to receive it. The transmission is successful as long as at least one AP receives the packet correctly. Proposed implementation will show that outperforms existing schemes remarkably.
Virtual Position based Olsr Protocol for Wireless Sensor Networksijcnes
This document summarizes a research paper on a virtual position-based routing protocol for wireless sensor networks. The protocol aims to address the "void routing problem" that occurs in geographic routing when a node has no neighbors that are closer to the destination. The proposed protocol maps node coordinates on the edges of voids to a virtual circle to transform the random network structure and allow greedy forwarding to continue. It divides the area around voids into three regions and applies different routing strategies in each region. Simulation results show the protocol achieves higher delivery rates, shorter paths, lower overhead and energy consumption compared to protocols using face routing to bypass voids.
Mitigation and control of Defeating Jammers using P-1 Factorizationijcnes
Jamming-resistant broadcast communication is crucial for safety-critical applications such as emergency alert broadcasts or the dissemination of navigation signals in adversarial settings. These applications share the need for guaranteed authenticity and availability of messages which are broadcasted by base stations to a large and unknown number of (potentially untrusted) receivers. Common techniques to counter jamming attacks such as Direct-Sequence Spread Spectrum (DSSS) and Frequency Hopping are based on secrets that need to be shared between the sender and the receivers before the start of the communication. However, broadcast anti jamming communication that relies on Pollards Rho Method. In this work, we therefore propose a solution called P-Rho Method to enables spread-spectrum anti-jamming broadcast communication without the requirement of shared secrets. complete our work with an experimental evaluation on a prototype implementation.
An analysis and impact factors on Agriculture field using Data Mining Techniquesijcnes
In computing and information huge amount of data was provided in the storage. The task is to extract the specified data from the raw data. Data mining is one of the techniques that will extract the data. Data mining techniques are used in many places. The techniques like K-means, K nearest neighbor, support vector machine, bi clustering, navie bayes classifier, neural networks and fuzzy C-means are applied on agricultural data. There are many factors in agriculture. The main factors for the farmer are climate, soil and yield prediction. Farmer must know To improve their production select suitable crop for suitable climate. This paper provides the various concepts of Data mining, their applications and also discusses the research field in agriculture. This paper discusses the different types of factors that impact in the agriculture field.
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...ijcnes
A code smell is an indication in the source code that hypothetically indicates a design problem in the equivalent software. The Code smells are certain code lines which makes problems in source code. It also means that code lines are bad design shape or any code made by bad coding practices. Code smells are structural characteristics of software that may indicates a code or drawing problem that makes software hard to evolve and maintain, and may trigger refactoring of code. In this paper, we proposed some success issues for smell detection tools which can assistance to develop the user experience and therefore the acceptance of such tools. The process of detecting and removing code smells with refactoring can be overwhelming.
Priority Based Multi Sen Car Technique in WSNijcnes
In Wireless sensor network (WSN), Clustering is an efficient mechanism used to overcome energy capability problem, routing and load balancing. This paper addresses energy utilization and load distribution between the clusters. The load balanced clustering algorithms (LBC) used to decrease the energy utilization and distribute load into clusters. The SenCar uses multi-user multi-input and multi-output (MU-MIMO) technique which is introduced the multi SenCar to collects the information from each cluster heads and upload the data in the base station. This method achieves more than 50 percent energy saving per node, 80 percent energy saving on cluster heads and also achieves less data collection time compared to the existing system
Semantic Search of E-Learning Documents Using Ontology Based Systemijcnes
The keyword searching mechanism is traditionally used for information retrieval from Web based systems. However, this system fails to meet the requirements in Web searching of the expert knowledge base based on the popular semantic systems. Semantic search of E-learning documents based on ontology is increasingly adopted in information retrieval systems. Ontology based system simplifies the task of finding correct information on the Web by building a search system based on the meaning of keyword instead of the keyword itself. The major function of the ontology based system is the development of specification of conceptualization which enhances the connection between the information present in the Web pages with that of the background knowledge.The semantic gap existing between the keyword found in documents and those in query can be matched suitably using Ontology based system. This paper provides a detailed account of the semantic search of E-learning documents using ontology based system by making comparison between various ontology systems. Based on this comparison, this survey attempts to identify the possible directions for future research.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Rainfall intensity duration frequency curve statistical analysis and modeling...bijceesjournal
Using data from 41 years in Patna’ India’ the study’s goal is to analyze the trends of how often it rains on a weekly, seasonal, and annual basis (1981−2020). First, utilizing the intensity-duration-frequency (IDF) curve and the relationship by statistically analyzing rainfall’ the historical rainfall data set for Patna’ India’ during a 41 year period (1981−2020), was evaluated for its quality. Changes in the hydrologic cycle as a result of increased greenhouse gas emissions are expected to induce variations in the intensity, length, and frequency of precipitation events. One strategy to lessen vulnerability is to quantify probable changes and adapt to them. Techniques such as log-normal, normal, and Gumbel are used (EV-I). Distributions were created with durations of 1, 2, 3, 6, and 24 h and return times of 2, 5, 10, 25, and 100 years. There were also mathematical correlations discovered between rainfall and recurrence interval.
Findings: Based on findings, the Gumbel approach produced the highest intensity values, whereas the other approaches produced values that were close to each other. The data indicates that 461.9 mm of rain fell during the monsoon season’s 301st week. However, it was found that the 29th week had the greatest average rainfall, 92.6 mm. With 952.6 mm on average, the monsoon season saw the highest rainfall. Calculations revealed that the yearly rainfall averaged 1171.1 mm. Using Weibull’s method, the study was subsequently expanded to examine rainfall distribution at different recurrence intervals of 2, 5, 10, and 25 years. Rainfall and recurrence interval mathematical correlations were also developed. Further regression analysis revealed that short wave irrigation, wind direction, wind speed, pressure, relative humidity, and temperature all had a substantial influence on rainfall.
Originality and value: The results of the rainfall IDF curves can provide useful information to policymakers in making appropriate decisions in managing and minimizing floods in the study area.
Rainfall intensity duration frequency curve statistical analysis and modeling...
Investigation on Challenges in Cloud Security to Provide Effective Cloud Computing Paradigm
1. Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.21-24
ISSN: 2278-2400
21
Investigation on Challenges in Cloud Security to
Provide Effective Cloud Computing Paradigm
C.Suresh
Department of Computer Science,Ganadipathy Tulsi’s Jain Engineering College,Vellore, Tamilnadu, India
Email:sureshinbox17@gmail.com
Abstract – Cloud computing provides the capability to use
computing and storage resources on a metered basis and reduce
the investments in an organization’s computing infrastructure.
The spawning and deletion of virtual machines running on
physical hardware and being controlled by hypervisors is a
cost-efficient and flexible computing paradigm. In addition, the
integration and widespread availability of large amounts of
sanitized information such as health care records can be of
tremendous benefit to researchers and practitioners. However,
as with any technology, the full potential of the cloud cannot be
achieved without understanding its capabilities, vulnerabilities,
advantages, and trade-offs. We propose a new method of
achieving the maximum benefit from cloud computation with
minimal risk. Issues such as data ownership, privacy
protections, data mobility, quality of service and service levels,
bandwidth costs, data protection, and support have to be
tackled in order to achieve the maximum benefit from cloud
computation with minimal risk.
Keywords – Cloud security, SAAS, Risk Assessment,
Challenges in Security.
I. INTRODUCTION
The adoption of cloud computing services is growing rapidly,
and one of the reasons is because its architecture stresses the
benefits of shared services over isolated products. This use of
shared services helps an organization focus on its primary
business drivers, and lets information system technology
departments reduce the gap between available computing
capacity (always-on high resource) and required systems
demand (mostly low volume with occasional spikes). This
results in a much more efficient usage-based cost model. Cloud
computing architecture is still evolving, and will continue to
evolve and change for a long time. As we begin to make sense
of the various vendors’ rush to brand everything as “cloud
computing,” it’s important to try to weed out the purely
marketing-related acronyms and concepts. For some time now,
the generally agreed upon classification scheme for cloud
computing has been coined the Software-Platform-
Infrastructure (SPI) model [1]. This acronym represents the
three major services provided through the cloud: SaaS, or
Software as a Service; PaaS, Platform as a Service; and IaaS,
Infrastructure as a Service. Although there are a few other
concepts circulating that suggest variations on this schema
(we’ll address some of these in the section “Alternative
Deployment Models”), the SPI framework [1] for cloud
computing is currently the most widely accepted cloud
computing classification. NIST follows this framework, and
most CSPs (cloud service providers) support this concept.
Although a lot of cloud computing infrastructure is based on
existing technology, there are many differences between the
SPI framework and the traditional IT model. For instance, a
traditional enterprise-wide application rollout requires
resources and coordination from many parts of the
organization. This rollout may require numerous new hardware
(servers, perimeter network devices, workstations, and backup
systems), operating systems, communication link provisioning,
and user and management training, for example. One advantage
of the traditional model is that software applications are more
customizable, but even this advantage often comes at a high
cost in resources and effort. In the traditional IT model,
software applications may require substantial licensing and
support costs. These licensing costs may be based on formulae
that don’t translate well to the actual intended use of the
application, such as hardware requirements (number of servers,
processors, communication links) or other company
characteristics unrelated to the original intent of the application
(total number of employees in the organization, total number of
remote offices, etc.).
Within each of the three delivery models just described are
multiple deployment models. For example, a SaaS delivery
model can be presented to users in one of several deployment
types, such as a private or public cloud. These deployment
models are technically functionally unrelated to each of the
delivery models — that is, any of the delivery models can exist
in any of the deployment scenarios, although a specific
delivery/deployment model pairing may be more common than
others (e.g., SaaS/public). Additionally, based upon the usage
of the cloud by an organization and its relationship to the
enterprise as a whole, these cloud deployment models are often
referred to as external or internal clouds. There are a number of
choices that a client can use to take advantage of the benefits of
cloud computing. These choices comprise the cloud delivery
models SaaS, PaaS, and IaaS of the SPI framework and the
private, community, public, and hybrid cloud deployment
models. The combinations selected and their implementations
are a function of the types of applications involved, storage
needs, time criticality, scaling requirements, and the economics
of the associated projects. The benefits of using cloud
computing are varied. They include a cloud’s inherent
flexibility and resiliency, the potential for reducing costs,
availability of very large amounts of centralized data storage,
means to rapidly deploy computing resources, and scalability.
Cloud computing can also intrinsically provide for migration
from operating in a capital expenditure environment to an
operational expenditure environment, support disaster recovery
and business continuity, and take advantage of centrally
applied security safeguards.
II. CLOUD COMPUTING SECURITY
FUNDAMENTALS
Security is a principal concern when entrusting an
organization’s critical information to geographically dispersed
2. Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.21-24
ISSN: 2278-2400
22
cloud platforms not under the direct control of that
organization. In addition to the conventional IT information
system security procedures, designing security into cloud
software during the software development life cycle can greatly
reduce the cloud attack surface. With cloud computing
providing SaaS, secure software is a critical issue. From the
cloud consumer’s point of view, using SaaS in the cloud
reduces the need for secure software development by the
customer. The requirement for secure software development is
transferred to the cloud provider. However, the user might still
find it necessary to develop custom code for the cloud.
Whoever develops the software, this process requires a strong
commitment to a formal, secure software development life
cycle, including design, testing, and secures deployment, patch
management, and disposal. Yet, in many instances, software
security is treated as an add-on to extant software and not as an
important element of the development process. Developing
secure software is based on applying the secure software design
principles that form the fundamental basis for software
assurance. Software assurance has been given many
definitions, and it is important to understand the concept. The
Software Security Assurance Report defines software assurance
as “the basis for gaining justifiable confidence that software
will consistently exhibit all properties required to ensure that
the software, in operation, will continue to operate dependably
despite the presence of sponsored (intentional) faults. [3] In
practical terms, such software must be able to resist most
attacks, tolerate as many as possible of those attacks it cannot
resist, and contain the damage and recover to a normal level of
operation as soon as possible after any attacks it is unable to
resist or tolerate.”
III. SECURE CLOUD COMPUTING
REQUIREMENTS
The requirements for secure cloud software are concerned with
nonfunctional issues such as minimizing or eliminating
vulnerabilities and ensuring that the software will perform as
required, even under attack. This goal is distinct from security
functionality in software, which addresses areas that derive
from the information security policy, such as identification,
authentication, and authorization. There are many methods for
developing code. Any of them can be used to develop a secure
cloud application. Every development model must have both
requirements and testing. In some models, the requirements
may emerge over time. It is very important that security
requirements are established early in the development process.
Security in a cloud application tends to be subtle and invisible.
Security is prominent at only two times in the development life
cycle: requirements definition and testing. At other times,
deadlines, capabilities, performance, the look and feel, and
dozens of other issues tend to push security to the back. This is
why it is important to ensure that security requirements are
prominent at the beginning of the software development life
cycle.
Cloud software security requirements are a function of policies
such as system security policies, software policies, and
information system policies. Cloud providers also have to
satisfy regulations and directives such as FISMA, Gramm-
Leach-Bliley, Sarbanes-Oxley, and HIPAA [3]. For proper
secure cloud software implementation, these issues have to be
accounted for during the software development life cycle and
through an effective cloud software security policy.
IV. SECURITY CHALLENGES IN CLOUD
COMPUTING
The introduction of cloud services presents many challenges to
an organization. When an organization migrates to consuming
cloud services, and especially public cloud services, much of
the computing system infrastructure will now be under the
control of a third-party Cloud Services Provider (CSP) [4][2].
Many of these challenges can and should be addressed through
management initiatives. These management initiatives will
require clearly delineating the ownership and responsibility
roles of both the CSP (which may or may not be the
organization itself) and the organization functioning in the role
as customer. Security managers must be able to determine what
detective and preventative controls exist to clearly define the
security posture of the organization. Although proper security
controls must be implemented based on asset, threat, and
vulnerability risk assessment matrices, and are contingent upon
the level of data protection needed, some general management
processes will be required regardless of the nature of the
organization’s business.
Security policies are the foundation of a sound security
implementation. Often organizations will implement technical
security solutions without first creating this foundation of
policies, standards, guidelines, and procedures, unintentionally
creating unfocused and ineffective security controls. A policy
is one of those terms that can mean several things. For
example, there are security policies on firewalls, which refer to
the access control and routing list information. Standards,
procedures, and guidelines are also referred to as policies in the
larger sense of a global information security policy.
Although the global adoption of virtualization is a relatively
recent event, threats to the virtualized infrastructure are
evolving just as quickly. Historically, the development and
implementation of new technology has preceded the full
understanding of its inherent security risks, and virtualized
systems are no different. The following sections examine the
threats and vulnerabilities inherent in virtualized systems and
look at some common management solutions to those threats.
These classifications are somewhat ambiguous in the IT
community at large. The most important thing to remember
from a security perspective is that there is a more significant
impact when a host OS with user applications and interfaces is
running outside of a VM at a level lower than the other VMs
(i.e., a Type 2 architecture). Because of its architecture, the
Type 2 environment [5] increases the potential risk of attacks
against the host OS.
V. SOFTWARE AS A SERVICE SECURITY
Cloud computing models of the future will likely combine the
use of SaaS (and other XaaS’s as appropriate), utility
computing, and Web 2.0 collaboration technologies to leverage
the Internet to satisfy their customers’ needs. New business
models being developed as a result of the move to cloud
computing are creating not only new technologies and business
operational processes but also new security requirements and
3. Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.21-24
ISSN: 2278-2400
23
challenges as described previously. As the most recent
evolutionary step in the cloud service model, SaaS will likely
remain the dominant cloud service model for the foreseeable
future and the area where the most critical need for security
practices and oversight will reside. Just as with a managed
service provider, corporations or end users will need to
research vendors’ policies on data security before using vendor
services to avoid losing or not being able to access their data.
Determining data security is harder today, so data security
functions have become more critical than they have been in the
past. A tactic not covered by Gartner is to encrypt the data
yourself. If you encrypt the data using a trusted algorithm, then
regardless of the service provider’s security and encryption
policies, the data will only be accessible with the decryption
keys. One of the most important actions for a security team is
to develop a formal charter for the security organization and
program. This will foster a shared vision among the team of
what security leadership is driving toward and expects, and will
also foster “ownership” in the success of the collective team.
The charter should be aligned with the strategic plan of the
organization or company the security team works for.
VI. RISK ASSESSMENT
Security risk assessment is critical to helping the information
security organization make informed decisions when balancing
the dueling priorities of business utility and protection of
assets. Lack of attention to completing formalized risk
assessments can contribute to an increase in information
security audit findings, can jeopardize certification goals, and
can lead to inefficient and ineffective selection of security
controls that may not adequately mitigate information security
risks to an acceptable level. A formal information security risk
management process should proactively assess information
security risks as well as plan and manage them on a periodic or
as-needed basis. More detailed and technical security risk
assessments in the form of threat modeling should also be
applied to applications and infrastructure. Doing so can help
the product management and engineering groups to be more
proactive in designing and testing the security of applications
and systems and to collaborate more closely with the internal
security team. Threat modeling requires IT and business
process knowledge, as well as technical knowledge of how the
applications or systems under review work.As SaaS moves into
cloud computing for the storage and processing of customer
data, there is a higher expectation that the SaaS will effectively
manage the security risks with third parties. Lack of a third-
party risk management program may result in damage to the
provider’s reputation, revenue losses, and legal actions should
the provider be found not to have performed due diligence on
its third-party vendors.
VII. VIRTUAL MACHINE SECURITY
In the cloud environment, physical servers are consolidated to
multiple virtual machine instances on virtualized servers. Not
only can data center security teams replicate typical security
controls for the data center at large to secure the virtual
machines, they can also advise their customers on how to
prepare these machines for migration to a cloud environment
when appropriate. Firewalls, intrusion detection and
prevention, integrity monitoring, and log inspection can all be
deployed as software on virtual machines to increase protection
and maintain compliance integrity of servers and applications
as virtual resources move from on-premises to public cloud
environments. By deploying this traditional line of defense to
the virtual machine itself, you can enable critical applications
and data to be moved to the cloud securely. To facilitate the
centralized management of a server firewall policy, the security
software loaded onto a virtual machine should include a
bidirectional firewall that enables virtual machine isolation and
location awareness, thereby enabling a tightened policy and the
flexibility to move the virtual machine from on-premises to
cloud resources. Integrity monitoring and log inspection
software must be applied at the virtual machine level. This
approach to virtual machine security, which connects the
machine back to the mother ship, has some advantages in that
the security software can be put into a single software agent
that provides for consistent control and management
throughout the cloud while integrating seamlessly back into
existing security infrastructure investments, providing
economies of scale, deployment, and cost savings for both the
service provider and the enterprise.
VIII. NEXT STEP IN CLOUD SECURITY
One of the most important considerations in deciding which
services should be placed on a cloud is cost. Cloud expenses
include charges for storage, processing time, and bandwidth
consumption. Bandwidth costs can be extremely high;
therefore, a cloud application that involves a large amount of
data being exchanged with a cloud over extended periods of
time would not be a good cloud candidate. Also, applications
that have a high degree of parallelism can be run more
efficiently on cloud systems using available distributed
processing frameworks such as Map/Reduce and Hadoop [6].
Another important consideration, especially for companies
involved in e-commerce, is availability and resilience. Critical
applications that can affect an organization’s mission should
not be placed on the cloud, and the cloud provider should
demonstrate that its system exhibits resiliency in the event of
system crashes and unexpected events. Applications should be
designed such that they can be moved from one cloud provider
to another, in order to avoid being locked in to a particular
vendor. In addition, some laws and regulations require that
critical data be kept on the organization’s site and under its
control. Cloud computing can also be used to provide cost-
effective backup services and to handle overflow tasks during
periods of peak activity such as seasonal work.
Google Groups provides the means for individuals and
organizations to setup a Group site devoted to a special interest
or topic. Having done so, group members can communicate
through the Web or e-mail to exchange information on their
subjects of interest. You need to know how much security is
enough, and to do that you need to know the security needs of
your data. Therefore, companies should assess the sensitivity of
the data they are considering moving to the cloud. It’s also very
important to consider the risks and benefits of cloud
computing. This can be done by executing a traditional risk
assessment, while focusing it on the risk/benefit of exploiting
the cloud. Adopting a flexible risk management process can be
a big help, if you don’t do this already. RM is the
identification, analysis, control, and minimization of loss that is
4. Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.21-24
ISSN: 2278-2400
24
associated with events [8][[9]. RM’s main function is to
mitigate risk. Mitigating risk means reducing risk until it
reaches a level that is acceptable to an organization. As you
consider security management controls, a cost versus benefit
analysis is a very important process. The need for, or value of,
a particular security control must be weighed against its impact
on resource allocation. A company can have exemplary
security with a seemingly infinite budget, but there is always a
point of diminishing returns, when the security demands
interfere with the primary business. Making the financial case
to upper management for various security controls is a very
important part of a security manager’s function. A trade-off
analysis can be formal or informal, depending upon the
audience and the intent of the analysis. If the audience of the
TOA is higher management or a client, often a formalized
TOA, supported by objective evidence, documentation, and
reports, will be necessary.[7][10] If the TOA will be examined
by internal staff or departments, often it can be less formal; but
the fundamental concepts and principles still apply in either
case.
IX. CONCLUSION
With the adoption of cloud technology comes many challenges
to an organization, especially in the area of secure computing.
Managing the security of the organization’s private cloud as
well as supervising the actions of the Cloud Services Provider
can well become a monumental task. To help lessen the size of
the task, clearly defined management initiatives must be
instituted which delineate clear ownership and responsibility of
the data security. Therefore in this chapter we examined
detective, preventative, and best practice controls to ensure that
virtualization doesn’t break the security posture of the
company. To this end we looked at the need and function of
security policies, and gave some examples of what types of
polices are usually developed. We also touched upon computer
intrusion detection and response and the creation of a
Computer Security Incident Response Team (CSIRT).We
looked first at some specific threats to the virtual environment,
then examined a few general security best practices, and then
ended with details of hardening techniques that are unique to
virtualized systems.
References
[1] Amit Sangroya, Saurabh Kumar, Jaideep Dhok, and
Vasudeva Varma, “Towards Analyzing Data Security
Risks in Cloud Computing Environments”, Springer-
Verlag Berlin Heidelberg 2010, pp. 255-265.
[2] Bernd Grobauer, Tobias Walloschek, and Elmar Stöcker,
“Understanding Cloud Computing Vulnerabilities”, IEEE,
1540- 7993/11, 2011, pp: 50-57.
[3] H. Takabi, J.B.D. Joshi, and G.-J. Ahn, “SecureCloud:
Towards a Comprehensive Security Framework for Cloud
Computing Environments,” Proc. 1st IEEE Int’l Workshop
Emerging Applications for Cloud Computing (CloudApp
2010), IEEE CS Press, 2010, pp. 393– 398.
[4] Hassan Takabi and James B.D. Joshi, University of
Pittsburgh, Gail – Joon and Ahn Arizona State University,
“Security and Privacy Challenges in Cloud Computing
Environments”, IEEE security and privacy,
www.computer.org/security, 2010, pp. 24 – 31.
[5] Krishnan Subramanian, “Private, Public and Hybrid
Clouds”, whitepaper: Trend Micro, 2011.
[6] Hsin-Yi Tsai, Melanie Siebenhaar and André Miede, Yu-
Lun Huang, Ralf Steinmetz, “Threat as a Service?
Virtualization’s impact on Cloud Security”, IEEE, IT Pro,
2012, pp: 32- 37.
[7] Rafael Moreno-Vozmediano, Rubén S. Montero, and
Ignacio M. Llorente, “Key Challenges in Cloud
Computing to Enable the Future Internet of Services”,
IEEE, Digital Object Indentifier 10.1109/MIC.2012.69.
[8] Jianyong Chen, Yang Wang, Xiaomin Wang, “On demand
Security Architecture for Cloud Computing”, IEEE, 0018-
9162, Digital Object Indentifier 10.1109/MC.2012.120,
pp: 1 -12.
[9] Bhaskar Prasad Rimal, Eunmi Choi, Ian Lumb, “A
Taxonomy and Survey of Cloud Computing Systems”,
978-0-7695-3769-6/09, IEEE, pp: 44 – 51.
[10]John Viega, “Cloud Computing and the Common Man”,
IEEE, 0018- 9162/09, pp: 106 – 108.
Suresh C was born in Vellore, India, in
1990. He received the B.E. degree in
computer science and engineering from
Kings Engineering College, Chennai. He
currently pursuing M.E degree in
computer science and engineering from
Ganadipathy Tulsi’s Jain Engineering College, Vellore. His
current research interests include cloud computing, enterprise
application, big data and software engineering.